General

  • Target

    JaffaCakes118_3d8409662827543c8d4059d46ecaa018

  • Size

    100KB

  • Sample

    250127-jwe74aznfq

  • MD5

    3d8409662827543c8d4059d46ecaa018

  • SHA1

    b79d3cd630adc274689807eb9acddbd00fd838bc

  • SHA256

    5a5c9f96366a08f445f7c9733a1bfeb8d804f7454c8f69d03909a904f68fc08f

  • SHA512

    afab7cb3884e4283a70351a2d19a715f98cd2ab8e7b47a8f7648da2512ddb12cac14653d77d074bd1ecc8e481bcfcd1a0474a9a0736393c3fb843563af196466

  • SSDEEP

    1536:gi6GGS1IlOd6ih9KgpjdMVSri+Jtg1Gax+1d3OYYWAd:gi31I3iLK+MQtCyd3OYKd

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_3d8409662827543c8d4059d46ecaa018

    • Size

      100KB

    • MD5

      3d8409662827543c8d4059d46ecaa018

    • SHA1

      b79d3cd630adc274689807eb9acddbd00fd838bc

    • SHA256

      5a5c9f96366a08f445f7c9733a1bfeb8d804f7454c8f69d03909a904f68fc08f

    • SHA512

      afab7cb3884e4283a70351a2d19a715f98cd2ab8e7b47a8f7648da2512ddb12cac14653d77d074bd1ecc8e481bcfcd1a0474a9a0736393c3fb843563af196466

    • SSDEEP

      1536:gi6GGS1IlOd6ih9KgpjdMVSri+Jtg1Gax+1d3OYYWAd:gi31I3iLK+MQtCyd3OYKd

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks